메뉴 건너뛰기




Volumn , Issue , 2010, Pages 289-290

Malware detection on mobile devices

Author keywords

Android; Machine learning; Malware; Mobile devices; Security; SELinux

Indexed keywords

APPLICATION FILES; HOST-BASED INTRUSION DETECTION; MACHINE LEARNING; MALWARE DETECTION; MALWARES;

EID: 77955205556     PISSN: 15516245     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MDM.2010.28     Document Type: Conference Paper
Times cited : (19)

References (8)
  • 2
    • 77950675112 scopus 로고    scopus 로고
    • Google android: A comprehensive security assessment
    • A. Shabtai, et al. "Google Android: A Comprehensive Security Assessment," IEEE Security and Privacy Magazine, http://doi. ieeecomputersociety.org/10.1109/MSP.2010.2.
    • IEEE Security and Privacy Magazine
    • Shabtai, A.1
  • 4
    • 77955178084 scopus 로고    scopus 로고
    • Detection, alert and response to malicious behavior in mobile devices: Knowledge-based approach
    • A. Shabtai, U. Kanonov, and Y. Elovici, "Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach," RAID, 2009.
    • (2009) RAID
    • Shabtai, A.1    Kanonov, U.2    Elovici, Y.3
  • 5
    • 77953137615 scopus 로고    scopus 로고
    • Intrusion detection on mobile devices using the knowledge based temporal-abstraction method
    • submitted pending revision to
    • A. Shabtai, U. Kanonov, Y. Elovici, "Intrusion Detection on Mobile Devices Using the Knowledge Based Temporal-Abstraction Method", submitted pending revision to Journal of systems and Software.
    • Journal of Systems and Software
    • Shabtai, A.1    Kanonov, U.2    Elovici, Y.3
  • 6
    • 77955175318 scopus 로고    scopus 로고
    • Using the KBTA method for inferring computer and network security alerts from timestamped, raw system metrics
    • A. Shabtai, Y. Fledel, Y. Elovici, and Y. Shahar, "Using the KBTA Method for Inferring Computer and Network Security Alerts from Timestamped, Raw System Metrics," Journal in Computer Virology, 8(3): 267-298, 2009.
    • (2009) Journal in Computer Virology , vol.8 , Issue.3 , pp. 267-298
    • Shabtai, A.1    Fledel, Y.2    Elovici, Y.3    Shahar, Y.4
  • 7
    • 77950673302 scopus 로고    scopus 로고
    • Securing android-powered mobile devices using SELinux
    • A. Shabtai, Y. Fledel, Y. Elovici, "Securing Android-Powered Mobile Devices Using SELinux", IEEE Security and Privacy, http://doi. ieeecomputersociety.org/10.1109/MSP.2009.144
    • IEEE Security and Privacy
    • Shabtai, A.1    Fledel, Y.2    Elovici, Y.3
  • 8
    • 77955189374 scopus 로고    scopus 로고
    • Detecting malicious applications on android by applying machine learning classifiers to static features
    • A. Shabtai, Y. Fledel, Y. Elovici "Detecting Malicious Applications on Android by Applying Machine Learning Classifiers to Static Features," (Poster) ACSAC, 2009.
    • (2009) (Poster)ACSAC
    • Shabtai, A.1    Fledel, Y.2    Elovici, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.